Exploiting weak configurations in Google Cloud Identity Platform

This blog post talks all about understanding and exploiting weak configuration in GCP Identity Platform

To Read Complete Blog Click here 🙌

Pankaj Mouriya
Pankaj Mouriya
Security, Platform Engineering | CKA | AWS Certified Security - Specialty

I Workout, diving deep into Supply Chain security, K8s, AWS Security, find Bugs in Web Applications and drink lots of coffee.